If you're looking to keep your online data safe and secure, you’re in the right place. Here’s some food for thought: the Mozy service successfully completed an SSAE 18 Type 2 audit, which resulted in a SOC 2 Type 2 report, as well as completed a recertification of ISO/IEC 27001 version 2013. A good portion of Mozy’s competition skips this important step. Not to mention, Mozy's cloud backup service also uses file encryption safe to prepare you for even the scariest of disasters. Your information is encrypted on your computer, during transit, and in our data centres. That’s why we’re the most trusted name in cloud backup.
Mozy encrypts each file before it’s sent over the wire, during transit, and at rest in our state-of-the-art data centres. And, if that doesn’t make you feel secure, how about this? You can choose your own personal encryption key or corporate encryption key, which is known only to you and uses 256-bit AES encryption. In addition, MozyEnterprise supports backup encryption key management via the Key Management Interoperability Protocol. This enables automatic generation of keys that can be managed with an on-premises key management server (KMS), which increases at-rest data security via finer encryption granularity.
Mozy manages multiple data centres around the world. So, take a deep breath, we know how to protect your data. With Mozy, you can expect:
During the backup process, all files are first secured with a personal 256-bit AES or a Mozy-managed 448-bit Blowfish encryption key and then transferred to a Mozy data centre, over a secure SSL connection, which uses the highest grade encryption available according to the default settings for OpenSSL.
MozyPro servers are located in world-class data centres protected by gated perimeter access, staffed 24x7x365 by onsite security and technicians, electronic card key access, and strategically placed security cameras inside and outside the building.
Mozy is an automated remote or offsite backup and a key component in any disaster recovery plan that protects against hardware failure, theft, virus attack, deletion, and natural disaster.